Port authentication method of authentication server, server, switch and storage medium
A technology of authentication server and port authentication, applied in the port authentication method of authentication server, server, switch and storage medium field, can solve problems such as security risks, and achieve the effect of reducing the possibility of security risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0079] figure 2 It is a flow chart of the port authentication method of the authentication server provided in Embodiment 1 of the present invention, image 3 It is a schematic diagram of the network topology structure of the existing authentication server directly connected to the switch, such as image 3 As shown, if the switch is directly connected to the authentication server, the switch, as the applicant, requests the authentication server to open the port directly connected to the switch on the authentication server, and the authentication server also acts as an agent in this process. Once the authentication server passes its authentication, the switch as the applicant will be upgraded to an authentication device and provide an agent for other switches that need authentication. At this time, the network topology becomes figure 1 As shown in the structure, the switch is upgraded to figure 1 The second switch in acts as a proxy, and the other switches are equivalent to ...
Embodiment 2
[0100] Figure 4 It is a flow chart of the port authentication method of the authentication server provided in Embodiment 2 of the present invention, such as image 3 As shown, if the switch is directly connected to the authentication server, the switch, as the applicant, requests the authentication server to open the port directly connected to the switch on the authentication server, and the authentication server also acts as an agent in this process. Once the authentication server passes its authentication, the switch as the applicant will be upgraded to an authentication device and provide an agent for other switches that need authentication. At this time, the network topology becomes figure 1 As shown in the structure, the switch is upgraded to figure 1 The second switch in acts as a proxy, and the other switches are equivalent to figure 1 The first switch in the network acts as the applicant, and the first switch applies to the authentication server to join the network ...
Embodiment 3
[0108] Figure 5 For the schematic diagram of the composition structure of the network topology provided by Embodiment 3 of the present invention, refer to Figure 5 According to the above network topology, a total of 4 authentication servers are used. In order to ensure the security of the network, the authentication server enables the port authentication function. The directly connected switches include 0-0, 1-0, 2-0, 3-0, These switches need to initiate authentication as applicants to their directly connected authentication servers to open the ports directly connected to the authentication server. If the authentication passes, switches 0-0, 1-0, 2-0, and 3-0 are upgraded to agents Or, and the switch or terminal connected to the switch 0-0, 1-0, 2-0, 3-0 respectively can be used as a new applicant to request to join the agent's network. If the authentication fails, any one connected to it will The switch cannot access the network, and the terminals cannot communicate with e...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


